The 3am Problem
It is 3:14am. Your purchasing agent detects that printer paper is running low — 15 units against a 50-unit threshold. It places a reorder. $50,000 spent. No ...
It is 3:14am. Your purchasing agent detects that printer paper is running low — 15 units against a 50-unit threshold. It places a reorder. $50,000 spent. No ...
Every approach to constraining autonomous agents eventually faces the same question: what happens when the constraint is tested?
AI agents are not users and they are not microservices. They occupy a new category — autonomous software that reasons, acts, and transacts on behalf of human...
When a human buys something online, they click “Purchase.” That click is their consent — implicit, instantaneous, revocable by calling their bank.
The first question every security leader asks about a new framework: “What happens to what I already have?”
This week I had a reading on critical infrastructure policy across the world. While there is a recognition of the importance of critical infrastructure, diff...
Now more than ever in today’s digital age, it’s more important than ever to take steps to protect personal information online. Cyber attacks are becoming inc...
I was intrigued by the release of ChatGPT for research last week. I set out to explore by putting a few of my questions.
An interesting Ted talk that resonated with me a lot. Seemingly complex endeours can indeed be put together using simple concepts.
You’ll find this post in your _posts directory. Go ahead and edit it and re-build the site to see your changes. You can rebuild the site in many different wa...